-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-14:28.file Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in file(1) and libmagic(3) Category: contrib Module: file Announced: 2014-12-10 Affects: All supported versions of FreeBSD. Credits: Thomas Jarosch of Intra2net AG Corrected: 2014-12-10 08:26:53 UTC (stable/10, 10.1-STABLE) 2014-12-10 08:35:55 UTC (releng/10.1, 10.1-RELEASE-p1) 2014-12-10 08:36:07 UTC (releng/10.0, 10.0-RELEASE-p13) 2014-12-10 08:31:41 UTC (stable/9, 9.3-STABLE) 2014-12-10 08:36:40 UTC (releng/9.3, 9.3-RELEASE-p6) 2014-12-10 08:36:40 UTC (releng/9.2, 9.2-RELEASE-p16) 2014-12-10 08:36:40 UTC (releng/9.1, 9.1-RELEASE-p23) 2014-12-10 08:31:41 UTC (stable/8, 8.4-STABLE) 2014-12-10 08:36:40 UTC (releng/8.4, 8.4-RELEASE-p20) CVE Name: CVE-2014-3710, CVE-2014-8116, CVE-2014-8117 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The file(1) utility attempts to classify file system objects based on filesystem, magic number and language tests. The libmagic(3) library provides most of the functionality of file(1) and may be used by other applications. II. Problem Description There are a number of denial of service issues in the ELF parser used by file(1). III. Impact An attacker who can cause file(1) or any other applications using the libmagic(3) library to be run on a maliciously constructed input can cause the application to crash or consume excessive CPU resources, resulting in a denial-of-service. IV. Workaround No workaround is available, but systems where file(1) and other libmagic(3)-using applications are never run on untrusted input are not vulnerable. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 10.1] # fetch http://security.FreeBSD.org/patches/SA-14:28/file-12.patch # fetch http://security.FreeBSD.org/patches/SA-14:28/file-12.patch.asc # gpg --verify file-12.patch.asc [FreeBSD 9.1, 9.2, 9.3 and 10.0] # fetch http://security.FreeBSD.org/patches/SA-14:28/file-8.patch # fetch http://security.FreeBSD.org/patches/SA-14:28/file-8.patch.asc # gpg --verify file-8.patch.asc [FreeBSD 8.4] # fetch http://security.FreeBSD.org/patches/SA-14:28/file-7.patch # fetch http://security.FreeBSD.org/patches/SA-14:28/file-7.patch.asc # gpg --verify file-7.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in . Restart all deamons using the library, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r275669 releng/8.4/ r275672 stable/9/ r275669 releng/9.1/ r275672 releng/9.2/ r275672 releng/9.3/ r275672 stable/10/ r275668 releng/10.0/ r275671 releng/10.1/ r275670 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUiA11AAoJEO1n7NZdz2rnCBMQAL/22vlzYOuAilNqQu5SZCZ8 i+VVrq9ZQv9Q32JiSs/eZtiz8d1OrhZK86a6dzx2vd5cV3QjWTOh5oK00gnO6Nq1 g1tqRDYVSzoPBVNLkpH0gKJjUNcxhzehQy2oge+7mtkcj3RsIX9MrPDpagIwdlOm KOHlfHL5w3sVbXvA9hqASH6GkvWKaj/QRm9wyHitVHYI9EbJE6jAyeDfzR1sFP54 f4FkT3TtsVw712+TYkC/EmgyPA8R6tK08LpYsa0pnwCtuMUkT+/zmDhcjXEyqZ0X cimkXyANSyDxzFjNrec0ETno35a5dNeasZvRg8DZXAGko9ainwUKTk5p+AUiKUOh MGxCFCkAPK/jbzBfZmQ7WMwpEDpjCxKK/C1qM2hHmpXwodzMtxSONicomcQrHm3O f2C1JWIy7V8pLZDVN8Ce25JLjDRt+cZc6JR2sICrfAjUWXRyCbmIsTj/+CjLHH1a /8hXs/TI0Z4jvcPsujoo7GhOdXvLz4Z7bY9cdZgEmZaUw+OwPN3DGiUEkK1+VNNt ClufF6cHWE9UaUp26fjoZ/qVTFt/ixIy7Qsx9EqA1YrnemI9mOxgxTFB1jqMM6uR NGEFUsyUQWLJxpinrEJIvJj5r9lQw11GaqsvyOyZ8IzPLJ31okYUXUFiFUECI+aN P0XVV9PyCfdO6tq8ajOi =+w7r -----END PGP SIGNATURE-----